End to End Security with z SystemsIBM Redbooks, 3 Apr 2015 - 50 halaman This IBM® RedpaperTM provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward. The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments. |
Istilah dan frasa umum
Access Control AppArmor architecture attacks audit authentication backup media certificate CICS client CP commands create Crypto Express5S data center database default defined DirMaint enabled encrypted communication Enterprise Linux external security manager firewall GENAPP guest operating system guest systems helps HiperSockets hypervisor hypervisor system IBM HTTP Server IBM MobileFirst IBM z13 IBM zSystems implemented information security policy integrity layer LDAP Linux Linux on IBM Linux on System Linux server LNXSRV10 LPAR Mainframe Mandatory Access Controls mobile application mobile device management monitoring OpenSSH operating system Operating system security organization password preferred practice privilege class protect Protocol RACF RACF/VM real device Redbooks role Security for Linux security label SELinux shared disk SSL/TLS system administrator system configuration file system resources system updates systems of engagement systems of record technologies trademarks traffic transactions user directory user ID management virtual machines VSWITCH z/OS z/VM system configuration